Securing Wireless Ad Hoc Networks: State of the Art and Challenges

Securing Wireless Ad Hoc Networks: State of the Art and Challenges

Victor Pomponiu
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch004
Cite Chapter Cite Chapter

MLA

Pomponiu, Victor. "Securing Wireless Ad Hoc Networks: State of the Art and Challenges." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 81-101. https://doi.org/10.4018/978-1-4666-4707-7.ch004

APA

Pomponiu, V. (2014). Securing Wireless Ad Hoc Networks: State of the Art and Challenges. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 81-101). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch004

Chicago

Pomponiu, Victor. "Securing Wireless Ad Hoc Networks: State of the Art and Challenges." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 81-101. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch004

Export Reference

Mendeley
Favorite

Abstract

The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.